Security Center 5.5 allows customers to implement more elaborate disaster recovery plans for their security platform
Security Center version 5.5 gives administrators greater control and protection of their security infrastructure

Genetec, a provider of open-architecture, unified IP security solutions has announced version 5.5 of Security Center, the company’s open architecture, unified IP security platform that combines access control, video surveillance, ALPR, and communications. Security Center 5.5 offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control hardware. With innovative capabilities designed to help organizations better secure their sites, version 5.5 gives administrators greater control and protection of their security infrastructure. Security Center 5.5 is available now via the Genetec worldwide channel partner distribution network.

Unified Platform Enhancements

With a new disaster recovery mode that allows the configuration of multiple failover directory servers at remote sites, Security Center 5.5 allows customers to implement more elaborate disaster recovery plans for their security platform. In the event of a disaster, failover servers at geographically disparate location can immediately take control and ensure organizations continue to have access to their security platform and protect their people and assets.

Security Center 5.5 features alarm
grouping and filtering so that
operators can group alarms visually
by type, state, or priority

Offering a powerful yet efficient user experience remains a paramount driver for Security Center development. In this latest release, map-centric monitoring offers enhanced, fluid map scaling for zooming effortlessly in and out of maps—from floorplans to satellite imagery—along with the option to geo-reference dynamic objects on a map with actual geographic coordinates for greater awareness, and add new map layers. With map layering, operators can add or remove details from a map in real-time to narrow or broaden visualization of a site. To further simplify alarm management, Security Center 5.5 features alarm grouping and filtering so that operators can group alarms visually by type, state, or priority, as well as handle entire collections of alarms, such as acknowledging or forwarding an entire group.

As part of a continuous effort to grow its ecosystem of technology partners and facilitate integration to Security Center, Genetec offers two flavors of its Software Development Kit (SDK). The Basic SDK is a freely-available package used to connect to Security Center and access configuration information, events and alarms in real-time, as well as make changes or add new tasks to the monitoring client app. A simplified online enrollment and acceptance process, that is largely automated, gives users quick access. An advanced SDK package offers all the elements of the Basic SDK with access to additional tools required by more complex integrations, and is available through Genetec certified channel partners.

Omnicast™ Video Management Enhancements

Building on the advanced cybersecurity measures introduced in Security Center 5.4, and the company’s ongoing commitment to ‘Security of Security’, version 5.5 offers a ‘hardened’ protocol that protects against potential hacking and non-authorized internal access. When users request to access video feeds, new authentication and authorization steps are in place to protect video data and privacy. By default, only secured media stream requests are accepted, ensuring the app or person making the request is authenticated to avoid any unauthorized requests. Token-based authentication is applied for authorizing and authenticating RTSP video requests, TLS encryption for securely transmitting these user authentication tokens, and RTSP over TLS for another level of video stream encryption while in transit.

Security Center 5.5 also offers users the ability to finely manage exported or saved content, such as video clips and snapshots, which facilitates modifications prior to sharing inside or outside an organization. Examples include the blurring and masking of snapshots to protect privacy, editing saved video clips to remove either sensitive or less valuable content and then re-exporting the final clips, adding new bookmarks to better qualify a recorded scene, and more. Sharing is made simpler by exporting video to the widely used MP4 format so as to leverage common off-the-shelf video players and eliminate the need for proprietary video players.

Synergis™ Access Control Enhancements

Security Center 5.5 also features new access control capabilities to improve organizational security, protect sensitive information, and increase customers' choice of access control hardware.

Security Center 5.5 also features
new access control capabilities
to improve organizational security
and protect sensitive information

Through the support of the latest firmware running on the Synergis™ Cloud Link appliance alongside Mercury Security controllers, organizations are able to extend the reach of their security platform with Allegion Schlage AD-300 Hardwired and AD-400 Wireless electronic locks. Organizations can also unify controller-based and electronic lock-based security systems in the process for a more inclusive approach to access control.

Security Center 5.5 introduces Peer-to-Peer (P2P) communications between Synergis Cloud Link appliances enabling global IO linking and global antipassback. Even when connectivity to the server is unavailable, Synergis Cloud Link appliances have the intelligence to share information across the network, like inputs triggering outputs across appliances and by extending the functionality of antipassback to areas managed by multiple appliances. This added flexibility enables users to move away from relying on constant connection to the server that improves overall security.

For greater protection of confidential and sensitive data, additional means of encrypting communications have been implemented between the Synergis Cloud Link appliance and the server along with numerous industry-leading Genetec access control hardware partners, including Mercury Security (EP controllers) and ASSA ABLOY (IP locks). The primary goal is to ensure secure communications throughout a customer’s entire access control infrastructure.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.